Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Software plagiarism detection method based on reduced shortest path birthmarks

A technology of the shortest path and detection method, applied in software testing/debugging, error detection/correction, instruments, etc., can solve problems such as insufficient consideration of program semantics and behavior, overall plagiarism, difficulty in handling large programs, etc., to improve anti-deep confusion ability, wide application range, great practical value effect

Active Publication Date: 2019-08-02
XIAN UNIV OF POSTS & TELECOMM
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the one hand, there is no lack of premeditated plagiarism driven by economic interests
In 2015, APICloud, a product of Grapefruit Technology, was suspected of plagiarizing a large number of codes of Digital Paradise DCloud and fell into an infringement case. The judicial appraisal report confirmed that it not only directly misappropriated DCloud’s dll files, but also copied DCloud’s functions such as running on the real machine and viewing while modifying. A large number of source codes; the recent "Red Core Disturbance" is even more noisy, claiming that the Red Core browser, which independently developed the domestic kernel, was exploded just to change the shell of Google Chrome; on the other hand, it was unintentional plagiarism
Most of the existing methods are difficult to resist the interference caused by different compilers and optimization options due to insufficient consideration of program semantics and behavior when constructing birthmarks
[0006] 3. The scalability of existing plagiarism detection methods is not good, and it is often difficult to deal with large-scale programs in reality
Most of the existing birthmark technologies mainly solve the problem of overall plagiarism. Due to the coupling and correlation between codes, it is often difficult for codes suspected of plagiarism to be packaged and run independently, which greatly limits the use of dynamic birthmark technologies with stronger detection capabilities. Applications in Local Plagiarism Detection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software plagiarism detection method based on reduced shortest path birthmarks
  • Software plagiarism detection method based on reduced shortest path birthmarks
  • Software plagiarism detection method based on reduced shortest path birthmarks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.

[0053] see figure 1 , which is the processing flow of the software plagiarism detection method based on reducing the shortest path birthmark, where the plaintiff program refers to the original program developed by the program owner, and the defendant program refers to the suspicious program suspected of plagiarizing part or all of the code of the original program. All are binary object programs and do not contain source code.

[0054] A software plagiarism detection method based on reducing the shortest path birthmark according to an embodiment of the present invention comprises the following steps:

[0055] Step S101: Use the static disassembly tool IDA Pro to analyze the plaintiff's program, extract all functions and their key elements from it, and the key elements include function address ID, assembly instruction set BODY, and con...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a software plagiarism detection method based on reduced shortest path birthmarks, which comprises the following steps: 1) statically disassembling a to-be-analyzed program to generate a to-be-analyzed function table; 2) for each function, searching a shortest path set from an entrance node of the control flow graph to other nodes, performing path reduction and abstraction,and constructing a reduced shortest path birthmark; 3) calculating the similarity between the reduced path birthmarks by using fuzzy hashing to serve as a measure of the similarity between functions;4) grouping the functions, and generating a function mapping table through maximum weighted bipartite graph matching; 5) calculating the similarity between the original program and the announced program, carrying out plagiarism judgment, and outputting a detection result. Through path searching and abstraction, the code confusion resisting capacity of the method is improved, and through fuzzy hashing and grouping matching, it is guaranteed that the method is applied to scalability of a large-scale real binary program.

Description

technical field [0001] The invention belongs to the technical field of program feature mining and software plagiarism detection, in particular to a software plagiarism detection method based on reducing the shortest path birthmark. Background technique [0002] The vigorous development of open source software communities such as GitHub, SourceForge, and social programming sites such as CodeShare has brought prosperity to the software industry; the accompanying problem of software plagiarism has become increasingly serious, and abuse of other people's code is not uncommon. On the one hand, there is no lack of premeditated plagiarism driven by economic interests. In 2015, APICloud, a product of Grapefruit Technology, was suspected of plagiarizing a large number of codes of Digital Paradise DCloud and fell into an infringement case. The judicial appraisal report confirmed that it not only directly misappropriated DCloud’s dll files, but also copied DCloud’s functions such as ru...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/36
CPCG06F11/3616
Inventor 田振洲谢博润王忠民张恒山高聪田杰何昆泽
Owner XIAN UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products